Get my own profile
Public access
View all16 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Zhuo LuUniversity of South FloridaVerified email at ieee.org
Wenye WangNorth Carolina State UniversityVerified email at ncsu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Peng NingGoogleVerified email at google.com
Wesley SnyderProfessor of Electrical and Computer Engineering, NCSUVerified email at ncsu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Kun SunGeorge Mason UniversityVerified email at gmu.edu
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
An LiuGoogleVerified email at google.com
Wes HardakerSenior Computer Scientist, USC/ISIVerified email at isi.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Radha PoovendranProfessor of ECE, University of WashingtonVerified email at uw.edu
Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Wenliang DuSyracuse University
Chenxi Wang (王晨曦)The University of TokyoVerified email at su.t.u-tokyo.ac.jp